...
Excerpt |
---|
This reference architecture represents a depictsa rudimentary legacy application that suffers from with no native integration with modern IAM capabilities. As such it would pose a significant challenge to manage and secure. Since most organizations with some historical IT background have similar applications in practice, it is of interest to discuss how such an application could be efficiently managed in an efficient manner and effectively secured in an effective manner. The second interesting aspect of this reference architecture is its simplicity. Such a monolithic siloed application is nearly atomic and thus represent a fundamental architectural patternstructure. |
Identity and Access Governance
...